Note: Some of the apps discussed in this blog entry were developed with an older adware SDK that did not contain opt-in provisions, particularly regarding the ability to collect information and display ads outside of the original app. The adware SDK has since been updated to this capability to comply with Google’s developer policies; apps…

This is part of a series of blog posts discussing the Chinese underground. The previous parts may be found here: Part 1: Introduction Part 2: The Four Value Chains Part 3: Virtual Assets Theft Part 4: Internet Resources And Services Abuse The full paper can be found here. The fourth and final value chain is…